{"id":"https://openalex.org/W2154149380","doi":"https://doi.org/10.1186/1687-6180-2013-169","title":"Security-reliability trade-off for cognitive radio networks in the presence of eavesdropping attack","display_name":"Security-reliability trade-off for cognitive radio networks in the presence of eavesdropping attack","publication_year":2013,"publication_date":"2013-11-06","ids":{"openalex":"https://openalex.org/W2154149380","doi":"https://doi.org/10.1186/1687-6180-2013-169","mag":"2154149380"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1186/1687-6180-2013-169","pdf_url":"https://asp-eurasipjournals.springeropen.com/track/pdf/10.1186/1687-6180-2013-169","source":{"id":"https://openalex.org/S35920007","display_name":"EURASIP Journal on Advances in Signal Processing","issn_l":"1687-6172","issn":["1687-6172","1687-6180"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://asp-eurasipjournals.springeropen.com/track/pdf/10.1186/1687-6180-2013-169","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073139448","display_name":"Jia Zhu","orcid":"https://orcid.org/0009-0003-3532-0143"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"funder","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jia Zhu","raw_affiliation_strings":["School of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, 210003, People's Republic of China"],"affiliations":[{"raw_affiliation_string":"School of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing, 210003, People's Republic of China","institution_ids":["https://openalex.org/I41198531"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5073139448"],"corresponding_institution_ids":["https://openalex.org/I41198531"],"apc_list":{"value":1140,"currency":"GBP","value_usd":1398},"apc_paid":{"value":1140,"currency":"GBP","value_usd":1398},"fwci":0.551,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":8,"citation_normalized_percentile":{"value":0.72553,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":83,"max":84},"biblio":{"volume":"2013","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10579","display_name":"Cognitive Radio Networks and Spectrum Sensing","score":0.9927,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.85228276},{"id":"https://openalex.org/keywords/cognitive-network","display_name":"Cognitive network","score":0.51346356},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.46946087}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.85228276},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.8171395},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6843332},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.6013524},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5767871},{"id":"https://openalex.org/C56985126","wikidata":"https://www.wikidata.org/wiki/Q854039","display_name":"Rayleigh fading","level":4,"score":0.5367165},{"id":"https://openalex.org/C32542511","wikidata":"https://www.wikidata.org/wiki/Q5141225","display_name":"Cognitive network","level":4,"score":0.51346356},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.46946087},{"id":"https://openalex.org/C68649174","wikidata":"https://www.wikidata.org/wiki/Q1379116","display_name":"Base station","level":2,"score":0.41384053},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.40470803},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.34541118},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.26444668},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.15314218},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14833143},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.07740167},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.06387919}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1186/1687-6180-2013-169","pdf_url":"https://asp-eurasipjournals.springeropen.com/track/pdf/10.1186/1687-6180-2013-169","source":{"id":"https://openalex.org/S35920007","display_name":"EURASIP Journal on Advances in Signal Processing","issn_l":"1687-6172","issn":["1687-6172","1687-6180"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1186/1687-6180-2013-169","pdf_url":"https://asp-eurasipjournals.springeropen.com/track/pdf/10.1186/1687-6180-2013-169","source":{"id":"https://openalex.org/S35920007","display_name":"EURASIP Journal on Advances in Signal Processing","issn_l":"1687-6172","issn":["1687-6172","1687-6180"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.54}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":17,"referenced_works":["https://openalex.org/W2060768956","https://openalex.org/W2072563372","https://openalex.org/W2096216442","https://openalex.org/W2101354295","https://openalex.org/W2106186328","https://openalex.org/W2121161215","https://openalex.org/W2131108755","https://openalex.org/W2133406100","https://openalex.org/W2134968843","https://openalex.org/W2145089386","https://openalex.org/W2145197862","https://openalex.org/W2152701100","https://openalex.org/W2155999145","https://openalex.org/W2156214717","https://openalex.org/W2168078104","https://openalex.org/W3099111716","https://openalex.org/W3106095601"],"related_works":["https://openalex.org/W3203708548","https://openalex.org/W2384472869","https://openalex.org/W2382279859","https://openalex.org/W2181410425","https://openalex.org/W2132580384","https://openalex.org/W2051888740","https://openalex.org/W2046691252","https://openalex.org/W2003835194","https://openalex.org/W1996209778","https://openalex.org/W1973050875"],"abstract_inverted_index":{"In":[0,28,83,187],"this":[1],"paper,":[2],"we":[3,92],"consider":[4],"a":[5,94,102],"cognitive":[6,13,19,30,67,99,131],"radio":[7,31],"network":[8],"that":[9,163],"consists":[10],"of":[11,25,59,125,151,173,192,201],"one":[12],"base":[14],"station":[15],"(CBS)":[16],"and":[17,44,71,73,113,145,155,185,198,211],"multiple":[18],"users":[20],"(CUs)":[21],"in":[22,149],"the":[23,29,50,56,62,66,89,105,121,134,143,152,156,165,170,181,190,202,209],"presence":[24],"an":[26],"eavesdropper.":[27],"network,":[32],"CBS":[33,70,110],"first":[34],"detects":[35],"whether":[36],"there":[37],"is":[38,111],"spectrum":[39,42,52,136],"hole":[40],"through":[41,214],"sensing":[43,137],"then":[45],"communicates":[46],"with":[47,104,117,133],"CUs":[48,72,193],"over":[49,138],"detected":[51],"hole.":[53],"Due":[54],"to":[55,75,85,109,115],"broadcast":[57],"nature":[58],"wireless":[60],"transmission,":[61],"eavesdropper":[63],"can":[64],"overhear":[65],"transmissions":[68,132],"between":[69,183],"attempts":[74],"decode":[76],"its":[77],"overheard":[78],"signals":[79],"for":[80,98,130],"interception":[81],"purpose.":[82],"order":[84],"effectively":[86],"defend":[87],"against":[88],"eavesdropping":[90],"attack,":[91],"propose":[93],"multiuser":[95,127,175,203,215],"scheduling":[96,128,176,204],"scheme":[97,129,177,205],"transmissions,":[100],"where":[101,142],"CU":[103],"highest":[106],"instantaneous":[107],"capacity":[108],"selected":[112],"scheduled":[114],"communicate":[116],"CBS.":[118],"We":[119],"analyze":[120],"security-reliability":[122],"trade-off":[123,182],"performance":[124],"proposed":[126,174],"imperfect":[135],"Rayleigh":[139],"fading":[140],"channels,":[141],"security":[144,184,210],"reliability":[146,212],"are":[147],"evaluated":[148],"terms":[150],"intercept":[153,166,196],"probability":[154,167,172,197,200],"outage":[157,171,199],"probability,":[158],"respectively.":[159],"Numerical":[160],"results":[161],"illustrate":[162],"as":[164,189],"requirement":[168],"loosens,":[169],"decreases":[178],"accordingly,":[179],"showing":[180],"reliability.":[186],"addition,":[188],"number":[191],"increases,":[194],"numerical":[195],"significantly":[206],"improve,":[207],"implying":[208],"benefits":[213],"scheduling.":[216]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2154149380","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1}],"updated_date":"2025-02-16T11:57:14.614955","created_date":"2016-06-24"}